Quantum Identity Authentication: Difference between revisions

From Quantum Protocol Zoo
Jump to navigation Jump to search
(Created page with "==Functionality== Authentication is a building block which proves something is true or genuine between two parties, the suppliant (prover) and the authenticator (verifier). Th...")
 
Line 1: Line 1:
==Functionality==
==Functionality==
Authentication is a building block which proves something is true or genuine between two parties, the suppliant (prover) and the authenticator (verifier). There are two types of authentication, data authentication and identity authentication. In data authentication, the authenticator checks the claim in a non-interactive process called offline mode, i.e. there is no interaction after the message has been sent. In identity authentication, the parties perform an interactive protocol where suppliant proves the possession of some unique data.
Authentication is a building block which proves something is true or genuine between two parties, the suppliant (prover) and the authenticator (verifier). There are two types of authentication, data authentication and identity authentication. In data authentication, the authenticator checks the claim in a non-interactive process called offline mode, i.e. there is no interaction after the message has been sent. In identity authentication, the parties perform an interactive protocol where suppliant proves the possession of some unique data.
==Properties==
*The security of the protocol requires that no sensitive information is exchanged during its execution

Revision as of 03:19, 18 June 2019

Functionality

Authentication is a building block which proves something is true or genuine between two parties, the suppliant (prover) and the authenticator (verifier). There are two types of authentication, data authentication and identity authentication. In data authentication, the authenticator checks the claim in a non-interactive process called offline mode, i.e. there is no interaction after the message has been sent. In identity authentication, the parties perform an interactive protocol where suppliant proves the possession of some unique data.

Properties

  • The security of the protocol requires that no sensitive information is exchanged during its execution